Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-12155: CWE-862 Missing Authorization in matthias-reuter SV100 Companion

0
Critical
VulnerabilityCVE-2024-12155cvecve-2024-12155cwe-862
Published: Fri Dec 06 2024 (12/06/2024, 08:24:57 UTC)
Source: CVE Database V5
Vendor/Project: matthias-reuter
Product: SV100 Companion

Description

CVE-2024-12155 is a critical vulnerability in the SV100 Companion WordPress plugin that allows unauthenticated attackers to modify site settings due to a missing authorization check in the settings_import() function. Exploitation enables attackers to change the default user role to administrator and enable user registration, resulting in privilege escalation and full administrative access. This vulnerability affects all versions up to and including 2. 0. 02. The CVSS score is 9. 8, reflecting its high impact and ease of exploitation without authentication or user interaction. No public exploits are currently known, but the risk is significant given the potential for complete site takeover. Organizations using this plugin should urgently apply patches or mitigations to prevent unauthorized access and maintain site integrity.

AI-Powered Analysis

AILast updated: 02/26/2026, 04:40:57 UTC

Technical Analysis

The SV100 Companion plugin for WordPress suffers from a critical authorization bypass vulnerability identified as CVE-2024-12155 (CWE-862). The root cause is a missing capability check in the settings_import() function, which is responsible for importing configuration settings. Because this function lacks proper authorization controls, unauthenticated attackers can invoke it to modify arbitrary WordPress options. A particularly dangerous exploitation path involves changing the default user role for new registrations to 'administrator' and enabling user registration. This allows attackers to create accounts with administrative privileges, effectively gaining full control over the WordPress site. The vulnerability affects all versions up to 2.0.02 inclusive. The CVSS v3.1 base score of 9.8 indicates a critical severity, with attack vector being network-based, no privileges or user interaction required, and impacts on confidentiality, integrity, and availability all rated high. Although no public exploits have been reported yet, the vulnerability's nature makes it highly exploitable. The lack of patch links suggests that a fix may not yet be available or publicly released, increasing the urgency for mitigation. This vulnerability is particularly dangerous because WordPress sites often serve as public-facing portals, and administrative compromise can lead to data theft, site defacement, malware distribution, or use in broader attacks.

Potential Impact

The impact of CVE-2024-12155 is severe for organizations running WordPress sites with the SV100 Companion plugin. Successful exploitation results in complete administrative takeover without requiring authentication, enabling attackers to manipulate site content, steal sensitive data, install malicious code, or disrupt services. This can lead to reputational damage, data breaches, regulatory non-compliance, and financial losses. Since WordPress powers a significant portion of the web, including many business and government sites, the scope of potential victims is broad. Attackers can leverage compromised sites as platforms for further attacks, including phishing, malware distribution, or lateral movement within networks. The ease of exploitation and high privileges gained make this vulnerability a critical risk to website security and operational continuity.

Mitigation Recommendations

Immediate mitigation steps include disabling or removing the SV100 Companion plugin until a security patch is released. Administrators should restrict access to WordPress administrative endpoints and consider disabling user registration temporarily to prevent unauthorized account creation. Implementing Web Application Firewall (WAF) rules to block requests targeting the settings_import() function can reduce exposure. Monitoring logs for unusual POST requests or changes to user roles is essential for early detection. Once a patch becomes available, it should be applied promptly. Additionally, enforcing strong authentication mechanisms such as multi-factor authentication (MFA) for all administrative accounts can limit damage if an attacker gains partial access. Regular backups and incident response plans should be reviewed and updated to prepare for potential compromise scenarios. Finally, site owners should audit all plugins for similar authorization issues to prevent analogous vulnerabilities.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-12-04T14:08:59.440Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6e30b7ef31ef0b59768d

Added to database: 2/25/2026, 9:48:32 PM

Last enriched: 2/26/2026, 4:40:57 AM

Last updated: 2/26/2026, 8:02:42 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats